Summary and findings

  1. Our analysis of the subject device has concluded that there is indeed electronic evidence present on the subject device, suggesting a breach. Malicious code we traced back to the Kovter family of malware was discovered and identified by investigators through the use of reverse engineering and forensic analysis.
  2. Detailed forensic analysis of the subject laptop, as well as examination of the compromised device's behavior while in a sandboxed state, did not uncover any evidence to indicate that any data was exfiltrated from the XYZ Corporation's network. Furthermore, no forensic evidence suggesting the perpetrators have launched attacks to other computers from the compromised laptop was discovered.

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.